Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2012/01/01 Vol. E95-DNo. 1pp. 185-187 Type of Manuscript: Special Section LETTER (Special Section on Trust, Security and Privacy in Computing and Communication Systems) Category: Privacy Keyword: cryptography, communication system security, integrated chip design, FPGA,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/10/01 Vol. E91-ANo. 10pp. 3047-3058 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: provable security, differential cryptanalysis, linear cryptanalysis, Feistel, CLEFIA, MISTY,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/09/01 Vol. E91-ANo. 9pp. 2607-2614 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: hash function, random oracle, ideal cipher model,
Publication: IEICE TRANSACTIONS on Communications Publication Date: 2008/08/01 Vol. E91-BNo. 8pp. 2702-2703 Type of Manuscript: LETTER Category: Fundamental Theories for Communications Keyword: ID-based key distribution, impersonation,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2008/05/01 Vol. E91-DNo. 5pp. 1481-1484 Type of Manuscript: Special Section LETTER (Special Section on Information and Communication System Security) Category: Secure Communication Keyword: signature, batch signing, imbalanced communication,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/02/01 Vol. E91-ANo. 2pp. 642-649 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: MISTY 1, MISTY 2, weak-key classes, related-key amplified boomerang attack, block ciphers,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2002/01/01 Vol. E85-ANo. 1pp. 38-43 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: Zodiac, impossible differential cryptanalysis,